{"title":"安全编排器在面向未来网络的网络切片中的作用","authors":"Shalitha Wijethilaka;Madhusanka Liyanage","doi":"10.23919/JCN.2023.000030","DOIUrl":null,"url":null,"abstract":"The traditional paradigm of connecting mobile devices over the telecommunication networks for voice communication has evolved to a myriad of novel applications with heterogeneous network requirements. The conventional telecommunication networks require a radical change to support these applications. Network slicing (NS) is one of the utilitarian technologies in future telecommunication networks to address this challenge by dividing the physical network into multiple logical networks with different network characteristics. The evolution in the applications and telecommunication networks intensifies the attention towards the security aspects. Since NS architecture is at its preliminary level, there is no security-specific element in the slicing architecture to perform security-related operations. Hence, we introduce the novel concept of security orchestrator for the NS architecture. This paper extensively discusses the expected advantages and design aspects of such a separate security orchestrator for an NS ecosystem. Moreover, the viability and the benefits of employing the proposed security orchestrator are demonstrated via a testbed implementation and relevant simulations. Finally, a set of potential future research directions related to the security orchestrator are introduced to further improve the proposed architecture's performance.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":"25 3","pages":"355-369"},"PeriodicalIF":2.9000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10190217/10190218.pdf","citationCount":"1","resultStr":"{\"title\":\"The role of security orchestrator in network slicing for future networks\",\"authors\":\"Shalitha Wijethilaka;Madhusanka Liyanage\",\"doi\":\"10.23919/JCN.2023.000030\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The traditional paradigm of connecting mobile devices over the telecommunication networks for voice communication has evolved to a myriad of novel applications with heterogeneous network requirements. The conventional telecommunication networks require a radical change to support these applications. Network slicing (NS) is one of the utilitarian technologies in future telecommunication networks to address this challenge by dividing the physical network into multiple logical networks with different network characteristics. The evolution in the applications and telecommunication networks intensifies the attention towards the security aspects. Since NS architecture is at its preliminary level, there is no security-specific element in the slicing architecture to perform security-related operations. Hence, we introduce the novel concept of security orchestrator for the NS architecture. This paper extensively discusses the expected advantages and design aspects of such a separate security orchestrator for an NS ecosystem. Moreover, the viability and the benefits of employing the proposed security orchestrator are demonstrated via a testbed implementation and relevant simulations. Finally, a set of potential future research directions related to the security orchestrator are introduced to further improve the proposed architecture's performance.\",\"PeriodicalId\":54864,\"journal\":{\"name\":\"Journal of Communications and Networks\",\"volume\":\"25 3\",\"pages\":\"355-369\"},\"PeriodicalIF\":2.9000,\"publicationDate\":\"2023-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/iel7/5449605/10190217/10190218.pdf\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Communications and Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10190218/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications and Networks","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10190218/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
The role of security orchestrator in network slicing for future networks
The traditional paradigm of connecting mobile devices over the telecommunication networks for voice communication has evolved to a myriad of novel applications with heterogeneous network requirements. The conventional telecommunication networks require a radical change to support these applications. Network slicing (NS) is one of the utilitarian technologies in future telecommunication networks to address this challenge by dividing the physical network into multiple logical networks with different network characteristics. The evolution in the applications and telecommunication networks intensifies the attention towards the security aspects. Since NS architecture is at its preliminary level, there is no security-specific element in the slicing architecture to perform security-related operations. Hence, we introduce the novel concept of security orchestrator for the NS architecture. This paper extensively discusses the expected advantages and design aspects of such a separate security orchestrator for an NS ecosystem. Moreover, the viability and the benefits of employing the proposed security orchestrator are demonstrated via a testbed implementation and relevant simulations. Finally, a set of potential future research directions related to the security orchestrator are introduced to further improve the proposed architecture's performance.
期刊介绍:
The JOURNAL OF COMMUNICATIONS AND NETWORKS is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks. Theoretical research contributions presenting new techniques, concepts, or analyses, applied contributions reporting on experiences and experiments, and tutorial expositions of permanent reference value are welcome. The subjects covered by this journal include all topics in communication theory and techniques, communication systems, and information networks. COMMUNICATION THEORY AND SYSTEMS WIRELESS COMMUNICATIONS NETWORKS AND SERVICES.